Summary
Overview
Work History
Education
Skills
Projects
Websites
Languages
Timeline
Generic

Raz Eilat

Herzaliya

Summary

Former combat soldier and cybersecurity enthusiast, with hands-on experience in penetration testing, vulnerability research, and system-level debugging. Self-taught with real-world offensive security work, including bug bounty reports and advanced Windows analysis. Currently transitioning into blue team roles such as MDR, combining technical skills with clear communication through video walkthroughs and client-facing work.

Overview

3
3
years of professional experience

Work History

Bug Bounty Hunter

Independent
01.2020 - 07.2021
  • Reported critical vulnerabilities on HackerOne and through personal research initiatives.
  • Focused on XSS, SQL injection, IDOR, and broken authentication flows.
  • Developed public write-ups and educational materials based on findings.

Web Developer

Freelancer
01.2019 - 11.2020
  • Developed and secured websites for personal and small business applications.
  • Conducted vulnerability assessments to guide secure deployment practices.
  • Launched two web applications in 2024 and 2025.

Education

Computer Science + Cyber Programs - Honors Program

Tichon Harishonim
06-2021

B.Sc. - Computer Science

The Open University of Israel
11-2020

Skills

  • Windows Debugging and API/System Calls
    Penetration Testing (Web, App)
    Active Directory Fundamentals
    Bug Bounty & Vulnerability Research
    Wireshark TCP/IP Log Analysis
    Linux & Windows Environments
    Web Application Security
    Python (Automation & Scripting)
    Threat Hunting (Foundational)
    Fast Learner Self-Starter Strong Communicator

Projects

 Monitoring System (Mini-SIEM)

  • Tracked processes, CPU, RAM, and MAC addresses across remote machines
  • Built a client-server system with a secure login and role-based permissions
  • Data visualized through a custom web interface
  • GitHub: https://github.com/PachUp/Monitoring_Project

Syscall Hooking for Ransomware Detection

  • Hooked into NtWriteFile syscall to monitor and alter file writes (XOR encryption)
  • Simulated ransomware behavior to study low-level syscall patterns
  • GitHub: https://github.com/PachUp/hooking_notepad_dll

Network Disruption Simulation – ARP Spoofing Tool (Educational)

  • Developed a Python tool using Scapy to simulate ARP spoofing and MITM attacks
  • Used to better understand attacker techniques and inform detection strategies
  • GitHub Gist: https://gist.github.com/PachUp/2d2359a1e04bb1c27d4dfe692cb17bdb

Languages

Hebrew/English
First Language

Timeline

Bug Bounty Hunter

Independent
01.2020 - 07.2021

Web Developer

Freelancer
01.2019 - 11.2020

Computer Science + Cyber Programs - Honors Program

Tichon Harishonim

B.Sc. - Computer Science

The Open University of Israel
Raz Eilat